Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
97e216c
update readme's todo
64ix Sep 2, 2025
8c0e6b3
feat: add confidential ai section in use cases
64ix Sep 2, 2025
ecf1e18
feat: RLC edits
64ix Sep 2, 2025
ee10940
fix: few things to change in welcome page
64ix Sep 2, 2025
4c7cd4f
refactor: remove "turnkey" keyword from the docs, add rlc new logo
64ix Sep 2, 2025
3dad8b9
fix change title
64ix Sep 3, 2025
c0c46cc
fix: roadmap link
64ix Sep 3, 2025
c8d2a31
feat: Vale edits
64ix Sep 3, 2025
44b0804
feat: mise à jour des sections sur les outils et le support dans la d…
64ix Sep 3, 2025
0fd4e8a
feat: amélioration de la lisibilité et mise à jour des sections sur l…
64ix Sep 3, 2025
7c1aa49
feat: mise à jour du titre de la section iApp en "Privacy iApp" et am…
64ix Sep 3, 2025
606ee2a
feat: update texts, images
64ix Sep 4, 2025
1aecec0
feat: mise à jour des styles de Vale en supprimant le style personnalisé
64ix Sep 4, 2025
4768aa2
fix: style spacing between elements
64ix Sep 5, 2025
2830e64
Merge branch 'main' into copy-review
64ix Sep 5, 2025
b291538
fix: prettier bug
64ix Sep 5, 2025
e780697
feat: change to webp rlc logo
64ix Sep 5, 2025
afd6b2c
Merge branch 'copy-review' of https://github.com/iExecBlockchainCompu…
64ix Sep 5, 2025
cba544d
fix: correction du nom de l'App Generator en iApp Generator dans la d…
64ix Sep 8, 2025
af70a38
fix: correction du terme "iApps" en "iApp" dans la documentation pour…
64ix Sep 8, 2025
604f43f
fix: mise à jour des liens et rename de la page "iApp" pour "Privacy…
64ix Sep 8, 2025
e2c9e57
fix: prettier
64ix Sep 8, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 10 additions & 1 deletion .github/styles/config/vocabularies/Technical/accept.txt
Original file line number Diff line number Diff line change
Expand Up @@ -173,7 +173,7 @@ presale
presigned
untrusted
dev
cryptocurrecny
cryptocurrency
Unmatching
incentivized
Whitepaper
Expand All @@ -190,3 +190,12 @@ chipset
auditable
Composable
Activable
RLC
API
dApp
iApp
IPFS
TEE
SGX
TDX
MCP
2 changes: 2 additions & 0 deletions .vale.ini
Original file line number Diff line number Diff line change
Expand Up @@ -11,3 +11,5 @@ md = markdown
[*.md]
BasedOnStyles = Vale, Google
IgnorePatterns = README.md

Google.Acronyms = NO
4 changes: 2 additions & 2 deletions .vitepress/sidebar.ts
Original file line number Diff line number Diff line change
Expand Up @@ -64,8 +64,8 @@ export function getSidebar() {
link: '/get-started/overview/protected-data',
},
{
text: 'iApp',
link: '/get-started/overview/iapp',
text: 'Privacy iApp',
link: '/get-started/overview/privacy-iapp',
},
{
text: 'Workerpool',
Expand Down
3 changes: 0 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -171,11 +171,8 @@ please see our [CONTRIBUTING.md](CONTRIBUTING.md) guide.**
- Talk about ENS on Bellecour(it's not supported on arbitrum)
- Talk about encrypting results in use-iapp
- Refactor "advanced" section in build-iapp
- Rework src\get-started\protocol\iexec-doracle.md (transfer to guide or
rewrite)
- Talk about encrypting results in use-iapp (link in outputs, iapp generator...)
- Rework src\get-started\protocol\oracle.md (transfer to guide or rewrite)
- Talk about iApp secret
- Improve Guide in build-iapp section - be more clear for builder ( how to
process process protectedData, clarify input-output guide)
- Add illustration in the different pages
Binary file removed src/assets/rlc/rlc.gif
Binary file not shown.
Binary file added src/assets/rlc/rlc.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added src/assets/use-cases/mcp-server.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed src/assets/use-cases/mpc-server.jpg
Binary file not shown.
Binary file modified src/assets/use-cases/private-image-generator.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion src/get-started/helloWorld/2-protectData.md
Original file line number Diff line number Diff line change
Expand Up @@ -161,7 +161,7 @@ bun add @iexec/dataprotector
import { Address, IExecDataProtector } from '@iexec/dataprotector';
```

Create a new instance and call the methods you need
Create a new instance and call the methods you need.

</div>
</div>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,16 +13,18 @@
import CardWithoutBorder from '@/components/CardWithoutBorder.vue';
</script>

# iApp
# What is an iApp?

Check notice on line 16 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L16

[Google.Contractions] Use 'what's' instead of 'What is'.
Raw output
{"message": "[Google.Contractions] Use 'what's' instead of 'What is'.", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 16, "column": 3}}}, "severity": "INFO"}

An iExec Application (iApp) brings Turnkey Privacy to your regular application
code. Your Python scripts, AI models, or data processors can securely process
protected data inside a TEE (Trusted Execution Environment).
An iExec Application (iApp) is an application that runs inside a confidential

Check warning on line 18 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L18

[Google.WordList] Use 'app' instead of 'application'.
Raw output
{"message": "[Google.WordList] Use 'app' instead of 'application'.", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 18, "column": 35}}}, "severity": "WARNING"}
environment (TEEs) to process Protected Data (created with DataProtector).

## Why iApp Matter ?
Your Python scripts, AI models, or data processors can securely process
protected data inside a TEE.

iApp provide Turnkey Privacy capabilities. Process sensitive data while keeping
it private and secure.
## Why iApp Matters?

Check warning on line 24 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L24

[Google.Headings] 'Why iApp Matters?' should use sentence-style capitalization.
Raw output
{"message": "[Google.Headings] 'Why iApp Matters?' should use sentence-style capitalization.", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 24, "column": 4}}}, "severity": "WARNING"}

iApp provide privacy capabilities, allowing you to process sensitive data while
keeping it private and secure.

Imagine you want to build:

Expand All @@ -36,15 +38,16 @@
</CardWithoutBorder>

Users have this data, but they won't trust your regular app with it. **With
Turnkey Privacy iApp, they will.**
Privacy iApp, they will.**

Check warning on line 41 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L41

[Google.Will] Avoid using 'will'.
Raw output
{"message": "[Google.Will] Avoid using 'will'.", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 41, "column": 20}}}, "severity": "WARNING"}

**You gain their trust. They gain their privacy. Everyone wins.**

## Key Concepts

<CardWithBorder>

✅ **True Privacy:** Users never expose their raw data. Your app processes it privately inside secure enclaves

✅ **True Privacy:** Users never expose their raw data. Your app processes it

Check warning on line 49 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L49

[Google.Colons] ': U' should be in lowercase.
Raw output
{"message": "[Google.Colons] ': U' should be in lowercase.", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 49, "column": 1}}}, "severity": "WARNING"}
privately inside secure enclaves.

✅ **Trusted Execution:** iExec ensures your code runs inside a Trusted
Execution Environment (TEE), guaranteeing only the specified Docker image
Expand All @@ -62,18 +65,19 @@
## How it Works

Your code runs in a Trusted Execution Environment (TEE). This secure area exists
inside specific processors (Intel Software Guard Extensions (SGX)/Trust Domain
Extensions (TDX) chipset). Everything stays private and protected there, even
from the operating system.
inside specific processors (Intel Software Guard Extensions (SGX) or Trust

Check failure on line 68 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L68

[Vale.Terms] Use 'intel' instead of 'Intel'.
Raw output
{"message": "[Vale.Terms] Use 'intel' instead of 'Intel'.", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 68, "column": 29}}}, "severity": "ERROR"}
Domain Extensions (TDX) chipsets). Everything stays private and protected there,

Check failure on line 69 in src/get-started/overview/privacy-iapp.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/privacy-iapp.md#L69

[Vale.Spelling] Did you really mean 'chipsets'?
Raw output
{"message": "[Vale.Spelling] Did you really mean 'chipsets'?", "location": {"path": "src/get-started/overview/privacy-iapp.md", "range": {"start": {"line": 69, "column": 25}}}, "severity": "ERROR"}
even from the operating system.

Authorized users trigger iApp that process protected data inside this private
environment. Your iApp uses the data but never exposes it, not even to you.
Authorized users trigger an iApp that processes protected data inside this
private environment. Your iApp uses the data but never exposes it, not even to
you.

<CardWithBorder>

1. User provides private data
2. Data is protected with DataProtector
3. User builds and deploys a confidential iApp that processes protected data
3. You build and deploy a confidential iApp that processes protected data
4. Run the iApp with the corresponding protected data, performing confidential
computing

Expand All @@ -88,8 +92,8 @@

<CardGrid>
<CardWithoutBorder>
### Healthcare

### Healthcare

Process medical data for AI diagnosis without exposing patient information

Expand All @@ -108,14 +112,16 @@
### Media

Content recommendation engines that don't track user behavior
</CardWithoutBorder>

</CardWithoutBorder>

<CardWithoutBorder>

### Research

Collaborative research on sensitive datasets across institutions
</CardWithoutBorder>

</CardWithoutBorder>

</CardGrid>

Expand Down
7 changes: 5 additions & 2 deletions src/get-started/overview/protected-data.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,12 @@
# Protected Data

Protected Data refers to any data encrypted using the **iExec Data Protector
tool**. This Turnkey Privacy encryption solution enables users to protect,
tool**. This Privacy Toolkit encryption solution enables users to protect,

Check warning on line 19 in src/get-started/overview/protected-data.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/protected-data.md#L19

[Google.OxfordComma] Use the Oxford comma in 'This Privacy Toolkit encryption solution enables users to protect, manage and'.
Raw output
{"message": "[Google.OxfordComma] Use the Oxford comma in 'This Privacy Toolkit encryption solution enables users to protect, manage and'.", "location": {"path": "src/get-started/overview/protected-data.md", "range": {"start": {"line": 19, "column": 9}}}, "severity": "WARNING"}
manage and monetize their data within the Web3 ecosystem effortlessly.

This Protected Data can only be decrypted and used inside TEE enclaves, by

Check notice on line 22 in src/get-started/overview/protected-data.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/protected-data.md#L22

[Google.Passive] In general, use active voice instead of passive voice ('be decrypted').
Raw output
{"message": "[Google.Passive] In general, use active voice instead of passive voice ('be decrypted').", "location": {"path": "src/get-started/overview/protected-data.md", "range": {"start": {"line": 22, "column": 30}}}, "severity": "INFO"}
authorized actors (Requester, iApp, Worker)

::: tip <i></i>

Unlike standard datasets, Protected Data exposes its **data types on-chain**
Expand Down Expand Up @@ -53,7 +56,7 @@
<CardWithBorder>

1. **Protect:** Encrypt and register your data on the iExec network
2. **Share:** Authorize specific users and iApps to access your data
2. **Share:** Authorize specific users and iApp to access your data
3. **Monitor:** Track usage and maintain control
4. **Monetize:** Earn from your data while keeping it private
5. **Compute:** Authorized users can compute on your data with authorized iApp
Expand Down
49 changes: 25 additions & 24 deletions src/get-started/overview/rlc.md
Original file line number Diff line number Diff line change
@@ -1,35 +1,28 @@
---
title: RLC Token
description:
RLC (Run on Lots of Computers) is the cryptocurrency powering iExec's
confidential computing ecosystem. Learn about RLC tokenomics, utility, and how
it drives privacy-first Web3 apps.
RLC is the cryptocurrency powering iExec's confidential computing ecosystem.
Learn about RLC tokenomics, utility, and how it drives privacy-first Web3
apps.
---

<img :src="rlcGif" alt="RLC Token Animation" class="size-80 -my-10 mx-auto" />
<img :src="rlcWebp" alt="RLC Token" class="size-80 mx-auto mb-8" />

# RLC Token

The native cryptocurrency that powers the entire iExec decentralized
confidential computing ecosystem

RLC (Run on Lots of Computers) powers all privacy apps on iExec. Every
confidential computation requires RLC. Every piece of protected data consumed
requires RLC. Every app execution requires RLC. The more builders use iExec
tools, the more utility RLC gains in real apps.

::: tip Info

On the iExec sidechain (Bellecour), the RLC token symbol becomes **xRLC**. xRLC
is the native token of the Bellecour chain and is used for all transactions and
payments on this network.

:::
RLC powers all privacy apps running on iExec. Every confidential computation
requires RLC. Every piece of protected data consumed requires RLC. Every app
execution requires RLC. The more builders use iExec tools, the more RLC has to
be bought and used by builder leveraging iExec's technology.

Check notice on line 19 in src/get-started/overview/rlc.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/rlc.md#L19

[Google.Passive] In general, use active voice instead of passive voice ('be bought').
Raw output
{"message": "[Google.Passive] In general, use active voice instead of passive voice ('be bought').", "location": {"path": "src/get-started/overview/rlc.md", "range": {"start": {"line": 19, "column": 1}}}, "severity": "INFO"}

## 🎯 Why RLC Matters

**Stack adoption = token usage.** When developers build with iExec tools, RLC
gets used. More privacy apps deployed means more RLC demand.
**iExec's adoption is linearly correlated to the real-time usage of the RLC
token** When developers build with iExec tools, RLC gets used. More privacy apps
deployed means more RLC demand.

### For users

Expand All @@ -38,13 +31,13 @@

### For providers

Build apps, provide data, or run workers. All earn RLC when people use your
contributions.
Build apps, provide data, or [run workers](/get-started/overview/workerpool).
All stakeholders earn RLC when people use their contributions.

### For holders

**Clear positioning:** More developers using iExec's privacy tools means more
RLC utility in real dApps. iExec builds actionable privacy, not just protocols.
More developers using iExec's privacy tools means more RLC utility in real
dApps. iExec builds actionable privacy, not just protocols.

Check failure on line 40 in src/get-started/overview/rlc.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/rlc.md#L40

[Vale.Terms] Use 'DApps' instead of 'dApps'.
Raw output
{"message": "[Vale.Terms] Use 'DApps' instead of 'dApps'.", "location": {"path": "src/get-started/overview/rlc.md", "range": {"start": {"line": 40, "column": 1}}}, "severity": "ERROR"}

## 💰 Transparent Payment Flow

Expand Down Expand Up @@ -75,6 +68,14 @@

### 📊 Ecosystem Growth Metrics

::: info

Circulating Supply The entire circulating supply of RLC has already been minted.

Check notice on line 73 in src/get-started/overview/rlc.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/rlc.md#L73

[Google.Passive] In general, use active voice instead of passive voice ('been minted').
Raw output
{"message": "[Google.Passive] In general, use active voice instead of passive voice ('been minted').", "location": {"path": "src/get-started/overview/rlc.md", "range": {"start": {"line": 73, "column": 69}}}, "severity": "INFO"}
There are no pending token unlocks or private allocations that could impact the
market. Since launch, iExec has been self-funded, without relying on VCs.

Check failure on line 75 in src/get-started/overview/rlc.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/rlc.md#L75

[Vale.Spelling] Did you really mean 'VCs'?
Raw output
{"message": "[Vale.Spelling] Did you really mean 'VCs'?", "location": {"path": "src/get-started/overview/rlc.md", "range": {"start": {"line": 75, "column": 70}}}, "severity": "ERROR"}

:::

**RLC operates** on a utility-driven economic model where demand for
confidential computing services drives token value:

Expand All @@ -84,7 +85,7 @@
**Network Effects**: As more users and providers join the iExec ecosystem, the
demand for RLC increases, driving token value through network effects.

**Utility-Driven Growth**: Every interaction in the **Turnkey Privacy**
**Utility-Driven Growth**: Every interaction in the **Privacy Toolkit**

Check warning on line 88 in src/get-started/overview/rlc.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/overview/rlc.md#L88

[Google.Colons] ': E' should be in lowercase.
Raw output
{"message": "[Google.Colons] ': E' should be in lowercase.", "location": {"path": "src/get-started/overview/rlc.md", "range": {"start": {"line": 88, "column": 26}}}, "severity": "WARNING"}
ecosystem requires RLC:

- iApp executions consume RLC for computation
Expand Down Expand Up @@ -148,5 +149,5 @@
import FeatureCard from '@/components/FeatureCard.vue';

// Assets
import rlcGif from '@/assets/rlc/rlc.gif';
import rlcWebp from '@/assets/rlc/rlc.webp';
</script>
4 changes: 2 additions & 2 deletions src/get-started/toolkit.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# iExec Toolkit

Build faster and smarter with our turnkey toolkit designed to streamline your
Build faster and smarter with our privacy toolkit designed to streamline your

Check warning on line 8 in src/get-started/toolkit.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/toolkit.md#L8

[Google.We] Try to avoid using first-person plural like 'our'.
Raw output
{"message": "[Google.We] Try to avoid using first-person plural like 'our'.", "location": {"path": "src/get-started/toolkit.md", "range": {"start": {"line": 8, "column": 31}}}, "severity": "WARNING"}
iExec development experience.

## iApp Generator
Expand Down Expand Up @@ -39,7 +39,7 @@
- **Asset visualization** to easily view and explore protected asset types on
the iExec protocol
- **Content consumption** capabilities for accessing protected data through
confidential iExec applications (iApps)
confidential iExec applications (iApp)
- **Governance management** to control who accesses your data, when, and at what
price

Expand Down
29 changes: 27 additions & 2 deletions src/get-started/use-cases.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,31 @@
githubUrl="https://github.com/iExecBlockchainComputing/web3-messaging-usecase-demo"
/>

## iExec Confidential AI

Check warning on line 36 in src/get-started/use-cases.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/use-cases.md#L36

[Google.Headings] 'iExec Confidential AI' should use sentence-style capitalization.
Raw output
{"message": "[Google.Headings] 'iExec Confidential AI' should use sentence-style capitalization.", "location": {"path": "src/get-started/use-cases.md", "range": {"start": {"line": 36, "column": 4}}}, "severity": "WARNING"}

### At the crossroads of DePIN and AI

iExec provides the confidential computing infrastructure for AI, enabling
developers to protect and monetize the entire AI pipeline. With the Confidential
AI framework, you can:

- **Train models collaboratively.**
- **Monetize and reward contributors.**
- **Ensure integral, end-to-end encryption across the workflow.**

### End-to-end confidential AI pipeline

- **Trusted Execution Environments (TEEs):** Secure, tamper-proof enclaves for

Check notice on line 50 in src/get-started/use-cases.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/use-cases.md#L50

[Google.Parens] Use parentheses judiciously.
Raw output
{"message": "[Google.Parens] Use parentheses judiciously.", "location": {"path": "src/get-started/use-cases.md", "range": {"start": {"line": 50, "column": 36}}}, "severity": "INFO"}
AI training and inference.
- **Models and data stay encrypted at all times—processed without being
exposed.**
- **Execution and results are traced on-chain, ensuring verifiability and

Check notice on line 54 in src/get-started/use-cases.md

View workflow job for this annotation

GitHub Actions / vale

[vale] src/get-started/use-cases.md#L54

[Google.Passive] In general, use active voice instead of passive voice ('are traced').
Raw output
{"message": "[Google.Passive] In general, use active voice instead of passive voice ('are traced').", "location": {"path": "src/get-started/use-cases.md", "range": {"start": {"line": 54, "column": 27}}}, "severity": "INFO"}
accountability.**

</div>

<div class="space-y-8 mt-8">

<UseCaseCard
title="AI Agent"
description="Execute ElizaOS AI agents with full confidentiality in iExec TDX Trusted Execution Environments (TEEs)"
Expand All @@ -45,7 +70,7 @@
<UseCaseCard
title="MCP Server"
description="A Model Context Protocol (MCP) compatible server to interact with the iExec protocol — built for Claude, agents, and AI tooling"
:imageUrl="mpcServer"
:imageUrl="mcpServer"
imageAlt="AI Applications Demo Screenshot"
:features="['MCP Protocol', 'AI Integration', 'Claude Support']"
githubUrl="https://github.com/iExecBlockchainComputing/iexec-mcp-server"
Expand Down Expand Up @@ -78,7 +103,7 @@
import contentCreatorImage from '@/assets/use-cases/content-creator.png';
import web3MessagingImage from '@/assets/use-cases/web3-messaging.png';
import elizaosImage from '@/assets/use-cases/elizaos.png';
import mpcServer from '@/assets/use-cases/mpc-server.jpg';
import mcpServer from '@/assets/use-cases/mcp-server.png';
import privateImageGenerator from '@/assets/use-cases/private-image-generator.png';
import imageCaptionMatcher from '@/assets/use-cases/image-caption-matcher.png';
</script>
Loading